Example 8: Clearing Dynamic Secure Mac Addresses - Cisco Catalyst 4500 Series Configuration Manual

Release ios xe 3.3.0sg and ios 15.1(1)sg
Hide thumbs Also See for Catalyst 4500 Series:
Table of Contents

Advertisement

Configuring Port Security on PVLAN Ports
The following example shows how to configure rate limit for invalid source packets on Fast Ethernet
interface 5/1:
Switch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)# interface fastethernet 5/1
Switch(config-if)# switchport port-security limit rate invalid-source-mac none
Switch(config-if)# end
Switch#

Example 8: Clearing Dynamic Secure MAC Addresses

The following example shows how to clear a dynamic secure MAC address:
Switch# clear port-security dynamic address 0000.0001.0001
The following example shows how to clear all dynamic secure MAC addresses on Fast Ethernet interface
2/1:
Switch# clear port-security dynamic interface fa2/1
The following example shows how to clear all dynamic secure MAC addresses in the system:
Switch# clear port-security dynamic
Configuring Port Security on PVLAN Ports
You can configure port security on a private VLAN port to take advantage of private VLAN functionality
as well as to limit the number of MAC addresses.
This section follows the same configuration model that was presented for access ports.
Note
These sections describe how to configure trunk port security on host and promiscuous ports:
Configuring Port Security on an Isolated Private VLAN Host Port
Figure 47-1
this topology, the PC connected through port a on the switch can communicate only with the router
connected using the promiscuous port on the switch. The PC connected through port a cannot
communicate with the PC connected through port b.
Software Configuration Guide—Release IOS XE 3.3.0SG and IOS 15.1(1)SG
47-14
Configuring Port Security on an Isolated Private VLAN Host Port, page 47-14
Example of Port Security on an Isolated Private VLAN Host Port, page 47-16
Configuring Port Security on a Private VLAN Promiscuous Port, page 47-16
Example of Port Security on a Private VLAN Promiscuous Port, page 47-17
illustrates a typical topology for port security implemented on private VLAN host ports. In
Chapter 47
Configuring Port Security
OL-25340-01

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents